speakers
speakers
speakers
authors
Material Team
participants
No items found.
share

Take a deeper look at Material's automated detection and response features for Google Drive.

As recently announced, Material customers can now continuously protect against unwanted external sharing and excessive permissions in Google Drive. Today, we’ll take a deeper look at those capabilities in this video.

Material has expanded our search and discovery capabilities by allowing users to seamlessly create detections and remediations built upon those searches. Now, in addition to being able to quickly find and remediate sensitive content shared outside your organization, Material can do it for you. These exciting features enable you to maintain visibility and control over your shared files, with flexible responses–including automatically notifying file owners when sensitive content is shared externally andbuilt-in grace periods before access is automatically revoked.  This also helps secure the offboarding process, creating the ability to automatically revoke external access to files owned by an offboarded user upon the suspension of that user in Okta.

Watch the video below to see these capabilities in action.

Your Google Drive isn’t just a storage and collaboration platform: it’s critical infrastructure that needs to be protected accordingly. That’s the Material advantage.

To find out what sensitive files your organization is sharing, contact us for a demo today.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

Material Team
5
m read
Read post
Podcast

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

5
m listen
Listen to episode
Video

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

5
m watch
Watch video
Downloads

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

5
m listen
Watch video
Webinar

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

5
m listen
Listen episode
blog post

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

James Juran
7
m read
Read post
Podcast

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m listen
Listen to episode
Video

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m watch
Watch video
Downloads

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m listen
Watch video
Webinar

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m listen
Listen episode
blog post

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

Abhishek Agrawal
7
m read
Read post
Podcast

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m listen
Listen to episode
Video

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m watch
Watch video
Downloads

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m listen
Watch video
Webinar

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m listen
Listen episode
blog post

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Listen to episode
Video

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m watch
Watch video
Downloads

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Watch video
Webinar

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New